front pagenewsNorth Korean hackers Lazarus Group targets crypto wallets with fake NFTs

North Korean hackers Lazarus Group targets crypto wallets with fake NFTs

Published on

spot_img

Key Summary:
Lazarus Group hackers used fake NFT games to steal crypto wallet credentials.
The malware in DeTankZone exploits a Chrome vulnerability for remote access.
Social engineering helps the Lazarus Group target large audiences.


Yerevan (CoinChapter.com) – North Korean hackers known as Lazarus Group used fake NFT games to exploit Chrome vulnerabilities to steal crypto wallet credentials. Security analysts at Kaspersky Lab reported that the cyberattack exploited a zero-day vulnerability in Google Chrome to gain unauthorized access to user devices. The attackers targeted the blockchain game clone DeTankZone and advertised it as a play-to-earn (P2E) multiplayer online battle arena (MOBA) game to lure unsuspecting players.


Lazarus Group’s malware was embedded in the source code of the DeTankZone NFT game.
securelist.com
Lazarus Group embedded malware directly into gaming websites
detankzone.com
This allowed them to infect any device that interacted with the site. According to Kaspersky, the malicious script bypassed Chrome's security protections. It exploited a vulnerability in Chrome's V8 JavaScript engine, enabling remote code execution. In this way, the hackers deployed the Manuscrypt malware and took control of user devices. This access allowed them to obtain sensitive crypto wallet credentials without downloading or other typical interactions.
Kaspersky discovers Chrome vulnerability, Google releases patch
After discovering the vulnerability, Kaspersky Lab immediately notified Google. Soon after, Google released a security update to address the vulnerability, even though the attackers had already accessed several devices. The incident raised concerns about the wider impact of such attacks on cryptocurrency users and businesses around the world.
Boris Larin and Vasily Berdnikov, security analysts at Kaspersky, noted that the Lazarus Group used advanced social engineering techniques to create an illusion of authenticity for the game. They set up a professional website and high-level LinkedIn account to establish credibility. In addition, the attackers used social platforms such as X and LinkedIn to use AI-generated marketing materials and invited well-known cryptocurrency influencers to promote the fake NFT game. This comprehensive approach attracted a wide audience and increased the effectiveness of the attack.
Lazarus Group has a long history of cryptocurrency theft
The fake NFT game was not just a cover, it was a fully operational game. It included detailed game elements such as logos, 3D graphics, and user interfaces. However, anyone who visited the site was at serious risk. The Lazarus Group embedded the Manuscrypt malware in the game website. This malware harvested sensitive crypto wallet credentials, allowing them to conduct large-scale cryptocurrency theft.
The Lazarus Group has long been targeting the cryptocurrency industry. Notably, between 2020 and 2023, investigator ZachXBT linked them to more than 25 hacks with a total loss of more than $200 million. Therefore, this history highlights the group's continued focus on cryptocurrency theft. In addition, they often rely on vulnerabilities and social engineering to succeed.


Lazarus Group’s $200 million cryptocurrency laundering operation. Source:
ZachXBT
Major Cryptocurrency Theft Linked to Lazarus Group
Over the years, the Lazarus Group has conducted many major cryptocurrency theft operations. For example, in 2022, they reportedly stole more than $600 million in Ether (ETH) and USD Coin (USDC) through the Ronin Bridge hack. In addition, the U.S. Treasury Department has linked them to multiple cyberattacks against financial institutions and global cryptocurrency platforms.
In September 2023, data from 21.co (the parent company of 21Shares) showed that the organization still held more than $47 million in various cryptocurrencies. These included assets such as Bitcoin (BTC), Binance Coin (BNB), Avalanche (AVAX), and Polygon (MATIC).
Furthermore, the report estimates that the Lazarus Group has amassed more than $3 billion in digital assets between 2017 and 2023. Their influence on the cryptocurrency industry is enormous, highlighting their continued focus on the cryptocurrency market.
Social engineering is key to Lazarus Group’s cyber strategy
It is worth noting that the success of this attack relied heavily on social engineering. Through carefully crafted promotional materials, AI-generated graphics, and credible-looking LinkedIn profiles, the Lazarus Group successfully disguised their fake NFT games as legitimate games, attracting cryptocurrency enthusiasts. This sophisticated approach circumvents common cybersecurity defenses and expands the range of potential victims.

Latest Articles

Eyenovia 转型为 Hyperion DeFi,推出 5000 万美元 HYPE 国库及 HYPD 代币。

眼科公司Eyenovia宣布建立由Hyperliquid代币支持的50亿美元HYPE基金Eyenovia公司确认了一项价值5000万美元的计划,建立一个由Hyperliquid代币支持的HYPE基金。...

泰国批准仅针对持牌平台的五年加密税免除政策

泰国批准数字资产销售所得五年免税政策根据财政部的声明,泰国已批准对数字资产销售所得的五年免税政策。免税政策将于2025年1月1日开始,并于2029年12月31日结束。该措施取消了通过授权平台销售加密货...

狗狗币跌破上升通道,技术指标显示将下跌138%

2025年6月18日,狗狗币(DOGE)跌破上升通道 2025年6月18日,狗狗币(DOGE)交易价格为0.169美元,已经跌破其在2025年4月至6月初之间形成的上升通道,下跌幅度达22%。这一结...

《2025年6月18日仓鼠战斗每日组合与密码》

Hamster Kombat更新:关注社区与性能Hamster Kombat,这款基于Telegram的加密策略游戏,随着今日6月18日的每日组合和密码更新,继续其迅猛发展的势头。由GameDev H...

More Articles

Eyenovia 转型为 Hyperion DeFi,推出 5000 万美元 HYPE 国库及 HYPD 代币。

眼科公司Eyenovia宣布建立由Hyperliquid代币支持的50亿美元HYPE基金Eyenovia公司确认了一项价值5000万美元的计划,建立一个由Hyperliquid代币支持的HYPE基金。...

泰国批准仅针对持牌平台的五年加密税免除政策

泰国批准数字资产销售所得五年免税政策根据财政部的声明,泰国已批准对数字资产销售所得的五年免税政策。免税政策将于2025年1月1日开始,并于2029年12月31日结束。该措施取消了通过授权平台销售加密货...

狗狗币跌破上升通道,技术指标显示将下跌138%

2025年6月18日,狗狗币(DOGE)跌破上升通道 2025年6月18日,狗狗币(DOGE)交易价格为0.169美元,已经跌破其在2025年4月至6月初之间形成的上升通道,下跌幅度达22%。这一结...
en_GBEnglish